Heartbleed attacks to go uncounted? 
By Munir Kotadia | Apr 23, 2014 | Comment Now 
Blog: Exploit leaves no trace.
 
Telstra breached Privacy Act by exposing user data 
By Allie Coyne | Mar 11, 2014 | Comment Now 
One day before new privacy laws take effect.
 
NBN Co's fibre "ramp-up" is pure fantasy 
By Ry Crozier | Jan 29, 2014 | Comment Now 
[Blog post] The numbers say a slowdown, so why can't NBN Co?
 
Whitepaper: Buying Criteria for Advanced Malware Protection 
Nov 8, 2013 | Comment Now 
Advanced Malware Protection requires an integrated set of controls and a continuous process to detect, confirm, track, analyse and remediate these threats – before, during and ...
 
25 Years of Vulnerabilities: Research Report 
Nov 8, 2013 | Comment Now 
With 25 years of vulnerability data now available, this report takes a historical look at vulnerabilities over the years
 
Whitepaper: Implementing DSD's Top 35 Mitigation Strategies 
Nov 8, 2013 | Comment Now 
It is no longer an option to be complacent about securing our computer networks
 
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
 
Yahoo says email-snatching XSS worth a $12.50 coupon 
By Ry Crozier | Oct 1, 2013 | Comment Now 
Flaws allowed email account hijacking.
 
Yahoo pays out $12.50 bug bounty 
By Ry Crozier | Oct 1, 2013 | Comment Now 
As store credit for Yahoo gear, researchers say.
 
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
 
'Watering hole' attacks rise in prominence 
Sep 24, 2013 | Comment Now 
But have internet users learned anything?
 
McAfee threat report highlights mobile attacks 
By Adam Greenberg | Aug 22, 2013 | Comment Now 
McAfee explores what cyber problems are trending in its second-quarter threat report.
 
NSW Police mull portal, app for reporting crimes 
By Ry Crozier | Aug 2, 2013 | Comment Now 
May cover reporting of cybercrime.
 
Government falls short of Gershon contractor target 
By Paris Cowan | Jul 10, 2013 | Comment Now 
Eleven agencies miss their targets, still rely on ICT contractors.
 
Telstra exchange fire cost spirals above $20m 
By Ry Crozier | May 30, 2013 | Comment Now 
Few 'lessons learnt' for carriers, many for communities.
 
Fraud losses increase, crime clearinghouse says 
By Dan Kaplan | May 15, 2013 | Comment Now 
While fraud complaints fall.
 
Web malware overtakes network worms 
By Dan Kaplan | Apr 19, 2013 | Comment Now 
Conficker losing ground.
 
Govt commits to steady short-term IT staffing 
By Liz Tay | Apr 12, 2013 | Comment Now 
Coalition promises audit of government expenditure.
 
Antivirus apps knocked in malware report 
By Dan Raywood | Mar 27, 2013 | Comment Now 
Web based malware active for 20 day on average.
 
Microsoft investigated over foreign bribery: report 
Mar 20, 2013 | Comment Now 
Software maker takes allegations 'seriously'.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  13%
 
Denial of service attacks
  8%
 
Insider threats
  11%
TOTAL VOTES: 392

Vote